Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 126

Feb 21, 2021

Cybersecurity, Emerging Tech, Risk Management — Winter 2021 Writings & Media

Posted by in categories: cybercrime/malcode, energy

These three pillars of cybersecurity risk management need not stand alone. In fact, they all should be incorporated together in cybersecurity framework strategy to identify gaps, mitigate threats, and build resilience in the case of an inevitable cyberattack. Of course, there are many other elements and protocols associated with utilization of these cyber risk management pillars. Combining them creates a more holistic mindset that also makes it easier to plan and adapt. With the growing sophistication of global cyber-threats and the expanding digital attack surface, a vigilant three pillar approach makes good sense.

Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and evangelist for Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech Experts to Follow on LinkedIn.” Chuck was named as a 2020 top leader and influencer in “Who’s Who in Cybersecurity” by Onalytica. He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was named by The Potomac Officers Club and Executive Mosaic and GovCon as at “One of The Top Five Executives to Watch in GovCon Cybersecurity. Chuck is a two-time Presidential appointee who was an original member of the Department of Homeland Security. Chuck has been a featured speaker at numerous conferences and events including presenting before the G20 country meeting on energy cybersecurity.

Feb 13, 2021

A Billion-Dollar Dark Web Crime Lord Calls It Quits

Posted by in category: cybercrime/malcode

The “big hack” redux, riot planning on Facebook, and more of the week’s top security news.

Feb 13, 2021

Researchers hack Xbox console to develop nanoscale medical 3D printer

Posted by in categories: biotech/medical, cybercrime/malcode, nanotechnology

Researchers from the Technical University of Denmark (DTU) have repurposed a component from a Microsoft Xbox 360 to develop a high-resolution large-volume nanoscale 3D printer with various applications in the medical sector.

The team took an optical pick-up unit (OPU) component from an Xbox 360 console to replace a conventional Stereolithography (SLA) optical system, in order to drastically simplify the SLA 3D printing system. With the OPU costing less than $5, the researcher’s solution could potentially increase the affordability of such equipment by thousands of pounds.

“With our 3D printer that can print micro and nanoscale 3D objects, we are able to go from tens of micrometers in printing resolution down to hundreds of nanometers without expensive specialized components,” said DTU PhD Student Tien-Jen Chang and research team member.

Feb 12, 2021

Researcher hacks into 35 major technology firms

Posted by in category: cybercrime/malcode

A Romanian threat researcher detailed in a published report Wednesday how he broke into IT systems belonging to some of the largest corporations in the world. His assaults successfully targeted Apple, Microsoft, Tesla, PayPal, Netflix and more than 30 other corporations.

Feb 10, 2021

Supply-Chain Hack Breaches 35 Companies, Including PayPal, Microsoft, Apple

Posted by in category: cybercrime/malcode

Ethical hacker Alex Birsan developed a way to inject malicious code into open-source developer tools to exploit dependencies in organizations internal applications.

Feb 8, 2021

In Florida, a near-miss with a cybersecurity worst-case scenario

Posted by in category: cybercrime/malcode

“A hacker, who authorities believe to be the same one from the initial breach, took control of the computer and changed the acceptable level of sodium hydroxide — better known as lye, the main ingredient in many household drain cleaners — from 100 parts per million to 11100 parts per million. A water plant operator noticed immediately and corrected the change, Gualtieri said, adding that if the operator had missed it and the change didn’t trigger some of the plant’s alarms, the lye could have seeped into the water supply in 24 to 36 hours.”


A hacker broke into a Florida water treatment plant and ordered it to increase the amount of lye to extremely dangerous levels, officials said.

Continue reading “In Florida, a near-miss with a cybersecurity worst-case scenario” »

Feb 8, 2021

Dr. Julie Marble — JHU Applied Physics Lab — Human-Autonomy Interaction, Collaboration and Trust

Posted by in categories: biotech/medical, cybercrime/malcode, military, robotics/AI

Human-Autonomy Interaction, Collaboration and Trust — Dr. Julie Marble, JHU Applied Physics Laboratory (APL)


Dr. Julie Marble is a senior scientist at the Johns Hopkins University Applied Physics Laboratory (JHUAPL) leading research in human-autonomy interaction, collaboration and trust.

Continue reading “Dr. Julie Marble — JHU Applied Physics Lab — Human-Autonomy Interaction, Collaboration and Trust” »

Feb 8, 2021

FETT Bug Bounty Helps Strengthen SSITH Hardware Defenses

Posted by in category: cybercrime/malcode

After three months of reviewing more than 13000 hours of hacking exploits conducted by more than 580 cybersecurity researchers, DARPA today announced that its Finding Exploits to Thwart Tampering (FETT) Bug Bounty successfully proved the value of the secure hardware architectures developed under its System Security Integration Through Hardware and Firmware (SSITH) program while pinpointing critical areas to further harden defenses.

Feb 7, 2021

Cybersecurity Threats: The Daunting Challenge Of Securing The Internet Of Things

Posted by in categories: cybercrime/malcode, internet

Kindly see my latest FORBES article: Thanks for reading and sharing and stay safe!

#cybersecurity #internetofthings


By 2025, it is expected that there will be more than 30 billion IoT connections, almost 4 IoT devices per person on average and that also amounts to trillions of sensors connecting and interacting on these devices.

Continue reading “Cybersecurity Threats: The Daunting Challenge Of Securing The Internet Of Things” »

Feb 6, 2021

Google says it’s too easy for hackers to find new security flaws

Posted by in categories: cybercrime/malcode, internet

In December 2018, researchers at Google detected a group of hackers with their sights set on Microsoft’s Internet Explorer. Even though new development was shut down two years earlier, it’s such a common browser that if you can find a way to hack it, you’ve got a potential open door to billions of computers.